login here to get access:
-
order:
- view this reportdownload abstract
Applause – Crowdtesting 2019
May 23, 2019 | Vendor Analysis by Dominique Raviart
Applause, formerly known as uTest, was founded in 2007. The Framingham, MA (U.S.) headquartered company is a pioneer in crowdtesting. Applause started its crowdtesting activities by providing (manual) functional testing, initially targeting start-ups. Through the economic downturn, Applause gained contracts with well-known clients such as Micros [...] - view this reportdownload abstract
passbrains – Crowdtesting 2019
May 23, 2019 | Vendor Analysis by Dominique Raviart
passbrains is headquartered in Zürich, Switzerland and was founded in 1989 as PASS Group. PASS Group launched passbrains in January 2012 to offer crowdtesting services, focusing initially on functional testing, and to some extent on security testing, and compatibility testing, localization testing, and usability testing. In the past three y [...] - view this reportdownload abstract
Digivante/BugFinders – Crowdtesting 2019
May 22, 2019 | Vendor Analysis by Dominique Raviart
Digivante is a large crowdtesting vendor, with a community of 55k crowdtesters. Its key clients include large enterprises (e.g., Epson, Worldpay, Bang & Olufsen), digital agencies, and retail firms. Digivante is owned by its founders and key executives and has not taken any outside investment; it believes this ownership structure helps it to [...] - view this reportdownload abstract
IBM - Cyber Resiliency
May 22, 2019 | Vendor Analysis by Mike Smart
IBM organizes its cybersecurity services portfolio around seven key competencies: security strategy, risk, and compliance; security intelligence and operations; X-Force Red offensive security; X-Force Incident Response and Intelligence Services (IRIS); Identity and Access Management (IAM); data and access security; and Infrastructure and endpoint s [...] - view this reportdownload abstract
TCS - Cyber Resiliency
May 22, 2019 | Vendor Analysis by Mike Smart
This NelsonHall vendor assessment analyzes TCS’ offerings and capabilities in cyber resiliency. TCS has organized its Cyber Security Practice around: Cyber advisory services Cyber implementation services Cyber managed services Platform security as a service including SIEM and VM aaS; managed detection and response; cyber intell [...] - view this reportdownload abstract
Accenture - Cyber Resiliency
May 21, 2019 | Vendor Analysis by Mike Smart
This NelsonHall vendor assessment analyzes Accenture’s offerings and capabilities in cyber resiliency. Accenture provides end-to-end services to build the clients resiliency, with its services spanning strategy and risk, cyber defense, digital identity, application security, and managed security. [...] - view this reportdownload abstract
Deloitte- Cyber Resiliency
May 21, 2019 | Vendor Analysis by Mike Smart
This NelsonHall vendor assessment analyzes Deloitte’s offerings and capabilities in cyber resiliency. Deloitte divides its cyber resiliency services into four domains: Cyber Strategy with services including roadmap and architecture design; risk management; and training, education and awareness Cyber Secure which provide traditional [...] - view this reportdownload abstract
DXC Technology - Cyber Resiliency
May 21, 2019 | Vendor Analysis by Mike Smart
DXC’s security services provide an end to end security offering from advisory to architecture, implementation, and management. DXC’s approach is to protect, detect, and secure clients operations throughout digital transformations. [...] - view this reportdownload abstract
LTI - Cyber Resiliency
May 10, 2019 | Vendor Analysis by Mike Smart
This NelsonHall vendor assessment analyzes LTI’s offerings and capabilities in cyber resiliency. [...] - view this reportdownload abstract
NTT Security - Cyber Resiliency
May 10, 2019 | Vendor Analysis by Mike Smart
This NelsonHall vendor assessment analyzes NTT Security’s offerings and capabilities in cyber resiliency. NTT Security provides end-to-end cybersecurity services with: Consulting services to aid the client in building effective cybersecurity protection through cybersecurity advisory, architecture and design, and risk and compliance s [...]